Module 1 PPT - Compressed
Module 1 PPT - Compressed
Networking
Scope of a Network
▪ Networking is everywhere.
▪ Networks support the way we learn and gives a new dimension to our
cognizance.
▪ Networks support the way we communicate.
▪ Network support the way we work.
▪ Networks provide a pathway to transfer information.
Background
• Merging of computers and communications has had a profound influence on the
way computer systems are organized.
• The old model of a single computer serving all of the organization’s computational
needs has been replaced by one in which a large number of separate but
interconnected computers do the job.
5. Switch – A switch is a multiport bridge with a buffer and a design that can
boost its efficiency(a large number of ports imply less traffic) and
performance. A switch is a data link layer device. The switch can perform
error checking before forwarding data, which makes it very efficient as it
does not forward packets that have errors and forward good packets
selectively to the correct port only.
6. Routers – A router is a device like a switch that routes data packets based
on their IP addresses. The router is mainly a Network Layer device. Routers
normally connect LANs and WANs
7. Gateway – A gateway, as the name suggests, is a passage to connect
two networks that may work upon different networking models. They
work as messenger agents that take data from one system, interpret it,
and transfer it to another system.
Network Topologies
• In bus topology there is a main cable and all the devices are connected
to this main cable through drop lines.
• There is a device called tap that connects the drop line to the main
cable.
• Since all the data is transmitted over the main cable, there is a limit of
drop lines and the distance a main cable can have.
Advantages of bus topology
1. Easy installation, each cable needs to be connected with backbone
cable.
2. Less cables required than Mesh and star topology
Ring Topology
• In ring topology each device is connected with the two devices on either
side of it.
• This structure forms a ring thus it is known as ring topology.
• If a device wants to send data to another device then it sends the data in
one direction, each device in ring topology has a repeater, if the received
data is intended for other device then repeater forwards this data until the
intended device receives it.
Advantages of Ring Topology
1. Easy to install.
2. Managing is easier as to add or remove a device from the topology only
two links are required to be changed.
•
Hybrid Topology
25
Circuit Switching
• Circuit switching is a switching technique that establishes a dedicated path
between sender and receiver.
• In the Circuit Switching Technique, once the connection is established then the
dedicated path will remain to exist until the connection is terminated.
• Circuit switching in a network operates in a similar way as the telephone works.
• A complete end-to-end path must exist before the communication takes place.
• In case of circuit switching technique, when any user wants to send the data,
voice, video, a request signal is sent to the receiver then the receiver sends back
the acknowledgment to ensure the availability of the dedicated path. After
receiving the acknowledgment, dedicated path transfers the data.
• Circuit switching is used in public telephone network. It is used for voice
transmission.
• Fixed data can be transferred at a time in circuit switching technology.
26
• Communication through circuit switching has 3 phases:
• Circuit establishment
• Data transfer
• Circuit Disconnect
27
Message switching
• Message Switching is a switching technique in which a
message is transferred as a complete unit and routed through
intermediate nodes at which it is stored and forwarded.
• In Message Switching technique, there is no establishment of
a dedicated path between the sender and receiver.
• The destination address is appended to the message. Message
Switching provides a dynamic routing as the message is
routed through the intermediate nodes based on the
information available in the message.
• Message switches are programmed in such a way so that they
can provide the most efficient routes.
• Each and every node stores the entire message and then
forward it to the next node. This type of network is known
as store and forward network.
• Message switching treats each message as an independent
entity.
29
Advantages of message switching
30
Disadvantages of message switching
31
Packet switching
• The packet switching is a switching technique in which the message is sent in one
go, but it is divided into smaller pieces, and they are sent individually.
• The message splits into smaller pieces known as packets and packets are given a
unique number to identify their order at the receiving end.
• Every packet contains some information in its headers such as source address,
destination address and sequence number.
• Packets will travel across the network, taking the shortest path as possible.
• All the packets are reassembled at the receiving end in correct order.
• If any packet is missing or corrupted, then the message will be sent to resend the
message.
• If the correct order of the packets is reached, then the acknowledgment message
will be sent.
32
34
Advantages of packet switching:
35
Disadvantages of packet switching:
36
Packet Switching: Virtual Circuit
• In the virtual circuit approach, a preplanned route is established before any data
packets are sent.
• A logical connection is established when
➢ a sender send a "call request packet" to the receiver and the receiver send
back an acknowledge packet "call accepted packet" to the sender if the receiver
agrees on conversational parameters.
• The conversational parameters can be maximum packet sizes, path to be taken,
and other variables necessary to establish and maintain the conversation.
• Virtual circuits imply acknowledgements, flow control, and error control, so
virtual circuits are reliable.
• That is, they have the capability to inform upper-protocol layers if a transmission
problem occurs.
37
Packet Switching: Virtual Circuit
• In virtual circuit, the route between stations does not mean that this is a
dedicated path, as in circuit switching.
• A packet is still buffered at each node and queued for output over a line.
• The difference between virtual circuit and datagram approaches:
➢ With virtual circuit, the node does not need to make a routing decision
for each packet.
➢ It is made only once for all packets using that virtual circuit.
38
Packet Switching: Virtual Circuit
VC's offer guarantees that
41
Tasks involved in sending a letter
1-5.1 THE OSI MODEL
Layer 6. Presentation
Layer 5. Session
Receiver
Layer 4. Transport
Sender
Layer 3. Network
1. Physical Layer
2. Data Link Layer
3. Network Layer
4. Transport Layer
5. Session Layer
6. Presentation Layer
7. Application Layer
Physical Layer
The physical layer is responsible for movements of
individual bits from one hop (node) to the next.
◼ Function
◼ Physical characteristics of interfaces and media
◼ Representation of bits
◼ Data rate
◼ Synchronization of bits
◼ Line configuration (point-to-point or multipoint)
◼ Physical topology (mesh, star, ring or bus)
◼ Transmission mode ( simplex, half-duplex or duplex)
Physical layer
Data Link Layer
◼ Function
◼ Framing
◼ Physical addressing
◼ Flow control
◼ Error control
◼ Access control
Data link layer
Hop-to-hop delivery
Example 1
◼ Source-to-destination delivery
◼ Responsible from the delivery of packets from the original
source to the final destination
◼ Functions
◼ Logical addressing
◼ routing
Network layer
Source-to-destination delivery
Example 2
◼ Functions
◼ Port addressing
◼ Flow control
◼ Error control
Transport layer
Synchronization
Presentation Layer
The presentation layer is responsible for translation,
compression, and encryption.
◼ Functions
◼ Network virtual terminal (Remote log-in)
◼ Mail services
OSI Model
Data
Layer Function
unit
Receiver
User
Segment 4. Transport End-to-end connections and reliability
Network
Path determination and logical
Packet 3. Network
Network addressing
support Frame 2. Data Link Physical addressing
layers
Bit 1. Physical Media, signal and binary transmission
Interfaces and Services
• The function of each layer in computer networking
architecture is to provide services (i,e., setting up
connection, delivering information) to the layer above it.
Interfaces and
Services
• The active elements in each layer
are often called entities. An
entity can be a software entity
(such as a process), or a
hardware entity (such as an
intelligent I/O chip).
• The entities in layer n
implement a service used by
layer n+1. In this case layer n
called the service provider and
layer n+1 is called the service
user.
• Layer n may use the services of
layer n-1 in order to provide its
service.
Interfaces and Services
• Services are available at SAPs (Service
Access Points). The layer n SAPs are the
places where layer n+1 can access the
services offered. Each SAP has an address
that uniquely identifies it.
• At a typical interface, the layer n+1 entity
passes an IDU (Interface Data Unit) to the
layer n entity through the SAP.
• An IDU consist of two parts namely SDU
(Service Data Unit) and ICI (Interface
Control Information).
• The SDU is the information passes across
the network to the peer entity and then
up to layer n+1 ( in peer).
• The control information is needed to help
the lower layer so its job (e.g., the
number of bytes in the SDU) but is not
part of the data itself.
Interfaces and Services
• Services are available at SAPs (Service
Access Points). The layer n SAPs are the
places where layer n+1 can access the
services offered. Each SAP has an address
that uniquely identifies it.
• At a typical interface, the layer n+1 entity
passes an IDU (Interface Data Unit) to the
layer n entity through the SAP.
• An IDU consist of two parts namely SDU
(Service Data Unit) and ICI (Interface
Control Information).
• The SDU is the information passes across
the network to the peer entity and then
up to layer n+1 ( in peer).
• The control information is needed to help
the lower layer so its job (e.g., the
number of bytes in the SDU) but is not
part of the data itself.
Interfaces and Services
• In order to transfer SDU, the layer N entity has to divide (or merge) it into
many smaller pieces.
• Each piece is given a header and sent as a separate PDU (Protocol Data Unit)
such as a packet.
• The PDU header are used by peer entities to carry out their peer protocol.
• They also provide sequence number and counts.
• When layer N+1 passes PDU to layer N, they are treated as layer N SDUs.
Interfaces and Services
TCP/IP PROTOCOL SUITE
Physical Physical
Link 1 Link 3 Link 5 Link 6
D2 H2
Frame
D2 ame
Fr
H2
D2 H2 D2 H2
Frame Frame
Communication at the network layer
Legend Source Destination D Data H Header
A R1 R3 R4 B
Network Network
Physical Physical
D3 H3
Datagram
D3 H3
Datagram
Communication at transport layer
A Legend Source Destination D Data H Header B
Transport Transport
R1 R3 R4
Network Network
Physical Physical
D4 H4
Segment
D4 H4
Segment
Communication at application layer
A B
Application Legend Source Destination D Data H Header Application
Transport Transport
R1 R3 R4
Network Network
Physical Physical
D5 D5
Message
D5 D5
Message
OSI Model
TCP/IP and OSI model
TCP/IP Model
Internet Layer
Process-to-process protocol.
• User Datagram Protocol (UDP)
• Transmission Control Protocol (TCP)
• Stream Control Transmission Protocol (SCTP)
1-6 ADDRESSING
Example:
[Link]
A 6-byte (12 hexadecimal digits) physical
address.
Physical Address
1 packet
87 10 Data accepted
87 10 Data
4
Logical Address
Physical
addresses
changed
95 66 A P Data 95 66 A P Data
33 99 A P Data
Physical
addresses
changed
Port addresses
OSI is a generic, protocol independent standard. It is acting as an TCP/IP model depends on standard protocols about which the computer
interaction gateway between the network and the final-user. network has created. It is a connection protocol that assigns the
network of hosts over the internet.
The OSI model was developed first, and then protocols were created to The protocols were created first and then built the TCP/IP model.
fit the network architecture’s needs.
The OSI model represents defines administration, interfaces and It does not mention the services, interfaces, and protocols.
conventions. It describes clearly which layer provides services.
The protocols of the OSI model are better unseen and can be returned The TCP/IP model protocols are not hidden, and we cannot fit a new
with another appropriate protocol quickly. protocol stack in it.
It provides both connection and connectionless oriented transmission It provides connectionless transmission in the network layer and
in the network layer; however, only connection-oriented transmission supports connecting and connectionless-oriented transmission in the
in the transport layer. transport layer.
The smallest size of the OSI header is 5 bytes. The smallest size of the TCP/IP header is 20 bytes.
Protocols are unknown in the OSI model and are returned while the In TCP/IP, returning protocol is not difficult.
technology modifies.